More Related Content
Similar to Pal gov.tutorial6.session9.cybercrime (20)
More from Mustafa Jarrar (20)
Pal gov.tutorial6.session9.cybercrime
- 1. أكاديمية الحكومة اإللكترونية الفلسطينية
The Palestinian eGovernment Academy
www.egovacademy.ps
Tutorial 6: The Legal Framework of New Technologies
Session9
Cybercrime
Dr. Feras Milhem
PalGov © 2011 1
- 2. About
This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the
Commission of the European Communities, grant agreement 511159-TEMPUS-1-
2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps
Project Consortium:
Birzeit University, Palestine
University of Trento, Italy
(Coordinator )
Palestine Polytechnic University, Palestine Vrije Universiteit Brussel, Belgium
Palestine Technical University, Palestine
Université de Savoie, France
Ministry of Telecom and IT, Palestine
University of Namur, Belgium
Ministry of Interior, Palestine
TrueTrust, UK
Ministry of Local Government, Palestine
Coordinator:
Dr. Mustafa Jarrar
Birzeit University, P.O.Box 14- Birzeit, Palestine
Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011
2
- 3. © Copyright Notes
Everyone is encouraged to use this material, or part of it, but should properly
cite the project (logo and website), and the author of that part.
No part of this tutorial may be reproduced or modified in any form or by any
means, without prior written permission from the project, who have the full
copyrights on the material.
Attribution-NonCommercial-ShareAlike
CC-BY-NC-SA
This license lets others remix, tweak, and build upon your work non-
commercially, as long as they credit you and license their new creations
under the identical terms.
PalGov © 2011 3
- 4. ILOs
• Introduce legal framework of crimes
committed through the net in Palestine,
.• مقدمة عن اإلطار القانونً الجرٌمة األلكترونٌة فً فلسطٌن
Increase the knowledge of the trainee on
the importance of this subject. Orientation
on the type of Cybercrimes.
.زٌادة المعرفة حول الجرائم األلكترونٌة وانواعها
Orientations on the international efforts to
overcome crimes of this type.
PalGov © 2011 4
- 5. The legal framework of Penal Law
اإلطار القانوني لتشريعات الجزاء
• In the West Bank: The Penal Law of
1960.
1960 • في الضفة الغربية: قانون العقوبات لسنة
• In the Gaza Strip: The Penal Law of
1936
.1936 • في قطاع غزة: قانون العقوبات لسنة
BOTH LAWS do not regulate
cybercrimes.
كال القانون ال ينظمان جرائم الحاسوب
PalGov © 2011 5
- 6. The legal framework of Penal Law
اإلطار القانوني لتشريعات الجزاء
• No other laws provide penalties to crimes
committed online.
• ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق
.الشبكة االلكترونية
• CONSEQUENCE: Perpetrators escape
legal accountability
PalGov © 2011 6
- 7. What is Cybercrime
ما هي الجرائم األلكترونية
Illegal activity committed on the internet.
This is a broad term that describes
everything from electronic cracking to
denial of service attacks that cause
electronic commerce sites to lose
money".
كل أشكال السلوك غٌر المشروع الذى ٌرتكب باستخدام
الحاسب
PalGov © 2011 7
- 8. What is Cybercrime
ما هي الجرائم األلكترونية
Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
distribution, posting, and dissemination of
obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
transmission of harmful programmes.
- Cybercrimes against government.
Terrorism, money laundry
PalGov © 2011 8
- 9. Current Threat
التهديدات القائمة
Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking,
distribution, posting, and dissemination of
obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property),
transmission of harmful programmes.
- Cybercrimes against government.
Terrorism, money laundry
PalGov © 2011 9
- 10. Current Threat
التهديدات القائمة
- Crackers (Hackers): such as the intent to steal confidential
data, acquire free software, or perform malicious destruction of
files.
- Internet Fraud (Crimes of Deception), example trick via email
- Skimming is the theft of credit card information by
typically dishonest employees
- Phishing: is a way of attempting to acquire
information such as usernames, passwords, and
credit card details
- spam
- Money laundry
- Pornography and Illegal Obscenity
PalGov © 2011 10
- 11. Example Penal Law: Estonia
مثال قانون جزاء
- Article 268. Computer Fraud
Acquisition of other’s property or deriving of
benefits through introduction of computer
programs or data, as well as their modification,
deletion, blocking or another kind of
interference with the procedure of processing
information that influences its results and
causes direct property or another damage to a
person are punished with fine, arrest or
imprisonment within the term from one to six
years.
- بخصوص األحتٌال عبر األنترنت
PalGov © 2011 11
- 12. Example Penal Law: Estonia
مثال قانون جزاء
- Article 269. Deletion of computer
information or software
1. Illegal deletion, damage, violation or
blocking of computer information or
software are punished with fine or
arrest
- بخصوص تجرٌم حذف أو إعتداء أو تخرٌب أو حجب
معلومات من الكمبٌوتر أو أحد برامجه
PalGov © 2011 12
- 13. Example Penal Law: Estonia
مثال قانون جزاء
- Article 270. Computer sabotage
Introduction of data or programs, their
modification, deletion or blocking to create
disturbance interferences in the work of computer
or telecommunication system are punished with
fine, arrest or imprisonment within up to two
years.
- ٌعاقب كل من أدخل معلومات بشكل غٌر مشروع أو قام بتعدٌل أو
حذف أو حجب لخلق اضطراب على عمل جهاز الكمبٌوتر أو نظام
االتصاالت السلكٌة والالسلكٌة باالعتقال أوالغرامة أو السجن مدة تصل
.الى عامٌن
ً- هناك تشدٌد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرٌب
لسجالت الدولة
PalGov © 2011 13
- 14. Example Penal Law: Estonia
مثال قانون جزاء
- Article 272. Illegal interruption or blocking
of the computer system connection
- تقطٌع أو إغالق غٌر شرعً للربط عبر نظام الحاسوب
- Article 273. Obvious spread of computer
viruses
- نشر للفٌروسات عبر الحاسوب
- Article 274. Transfer of protecting codes
- نقل شفرات محمٌة سواء فً البرامج أو الشبكات
PalGov © 2011 14
- 15. Conventions/treaties
مواثيق إتفاقيات
• No unified position on international
agreement.
• Council of Europe: Convention on
Cybercrime
It is open for other states that the states
of CoE
ال توجد إتفاقٌة مصادق علٌها عالمٌا
مجلس دول أوروبا: إتفاقٌة حول جرائم الحاسوب
االتفاقٌة مفتوحة أمام دول من خارج مجلس دول أوروبا
PalGov © 2011 15
- 16. Budapest: Convention on Cybercrime
OBJECTIVES
• Pursue a common criminal policy
aimed at the protection of society
against cybercrime by adopting
appropriate legislation and fostering
international co-operation.
• السعً نحو سٌاسة جزائٌة موحدة تهدف إلى حماٌة
ًالمجتمع من جرائم الحاسوب، وذلك عن طرٌق تبن
.ًتشارٌع مناسبة وعن طرق تعزٌز التعاون الدول
PalGov © 2011 16
- 17. Budapest: Convention on Cybercrime
Called to adopt measures in the national level for:
- Illegal Access
- Illegal interception
- Data interference
- System interference
- Misuse of devices
- Computer related forgery
- Computer related fraud
- Pornography
- Infringements of Copyright
Call to adapt procedural provision
PalGov © 2011 17
- 18. Summary
• Palestine laws are silent about Cybercrimes.
No protection or punishment policies are
available. However, the new draft Penal Law
regulates some rules.
• ال ٌوجد تجرٌم فً فلسطٌن للجرائم المقترفة عبر الشبكة
.األلكترونٌة
• No international agreements, however, there
are regional agreements such as Budapest
convention.
• ال توجد إتفاقٌات دولٌة وإنما أقلٌمٌة مثل إتفاقٌة بودابست
• E-government in Palestine must be protected.
PalGov © 2011 18
- 19. References
• Palestine Penal Law of 1936 .
• The Jordanian Penal Law of 1960.
• Florence de Villenfagne, CRIDS, University of Namur,
PowerPoint Presentation on Cybercrimes, 2011.
• Estonian Penal Law
http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism
/Estonia.pdf
•
• Budapest: Convention on Cybercrime
http://www.coe.int/t/dghl/cooperation/economiccrime/cyb
ercrime/cy-activity-interface-
2010/presentations/Ws%203/cyber_octopus_WS_3_alex
ander_CCC_global_frame.pdf
ً• عبد الفتاح بٌومً حجازي، التجارة األلكترونٌة فً القانون العربً النموذج
2006 ،ًلمكافحة جرائم الكمبٌوتر واألنترنت، األسكندرٌة، دار الفكر الجامع
PalGov © 2011 19